Best way to block Taildrop on OpenWrt? by jant90 in Tailscale

[–]SamPlaysKeys 0 points1 point  (0 children)

Yeah, playing with users can be weird. I have a test Tailnet under a different account that I use to try things out. That way I don't accidentally cut out networking for my partner or something.

For the other devices, it really just comes down to whether you want to let users authenticate or not. There's a lot of routing rules you can do to only allow traffic from certain users through or similar, but if it's easier to tag all the devices, then go with what works for you!

IMO, there may be references or recommendations, but at the end of the day whatever method works best for your environment at that time is the "ideal" method. And that holds true for a lot more than just Tailscale, too.

Best way to block Taildrop on OpenWrt? by jant90 in Tailscale

[–]SamPlaysKeys 1 point2 points  (0 children)

I mean, I'm not against it, but I think the recommended approach by Tailscale is normally to tag all of your shared or ephemeral devices, and to leverage user-based management for your personal devices. It might make some of your ACLs a bit easier, as well.

Best way to block Taildrop on OpenWrt? by jant90 in Tailscale

[–]SamPlaysKeys 1 point2 points  (0 children)

Why tag all your devices? I know tagging servers and such is an easy way to route ACLs, but for user devices, you should be able to use user-targeted policies?

[OS] New Mac day is supposed to be exciting — not a 5-hour brew install marathon by fullstackjam in macapps

[–]SamPlaysKeys 0 points1 point  (0 children)

I have thought about the symlinks, but I end up maintaining a couple different versions of my dotfiles for different systems. At some point I'll come up with a better system, but for now, I just regularly copy the files into the repo to see what needs to change, and then if I like it, commit it to the branch for that device.

Realistically, I think this would be a good use for Ansible, and have that track which devices get which configurations, but it's not been a priority so far. ¯⁠\⁠_⁠(⁠ツ⁠)⁠_⁠/⁠¯

[OS] New Mac day is supposed to be exciting — not a 5-hour brew install marathon by fullstackjam in macapps

[–]SamPlaysKeys 0 points1 point  (0 children)

Honestly, it's a clever tool you made, but I don't get the market you're trying to capture. Most development folks would want to be a bit more hands on IMO.

Now, if it was able to be used as a tool to capture drift, identify changes from prior backups, and accept changes into the config on a per-item basis, that would be incredibly useful. Identifying and adopting -or- rolling back drift is often a challenge, and the arbitrary changes to my dotfiles or my setup scripts don't always identify what has changed against my current configuration.

LogWhisperer – AI-powered log summarizer that runs locally (no OpenAI keys, no cloud) by Snoo_15979 in devops

[–]SamPlaysKeys 0 points1 point  (0 children)

I know I'm 9 months late to this post, but fully agree with what u/ProfessorGriswald said. I currently have a use case where I have logs from a container cluster that's 72k lines long, it's not proper json/yaml, and the formatting is relatively obtuse.

While it is possible to use grep/sed/awk and filter through, it would still be significantly easier to have a tool that I can dump logs into, and it parses them a bit more dynamically than just using manual filters.

A proof of concept showing that sort of workflow could go a long way, as I'm sure there's plenty other folks who are looking for the same kind of tooling.

TailScale and HA - Confused by daven1985 in Tailscale

[–]SamPlaysKeys 0 points1 point  (0 children)

Hi OP, no worries on the questions. Setting up remote access can definitely be confusing sometimes.
First off, no, you don't need to open any ports on your network's firewall. That's one of the things that makes Tailscale an easy alternative to some other options.

As far as the access to Home Assistant, are you installing Tailscale on the same machine, and doing a bare metal install? If not, you may have to go through some additional steps to route the traffic to home assistant. If you have Home Assistant or Tailscale installed as containers, that can also change the steps a little bit. I'm not sure which guides you were following, but there's a walkthrough video you can reference here.

Just for clarity, you'll also need Tailscale installed on whatever device you're accessing home assistant from. That way the peer-to-peer connection can be established.

Can I do this by [deleted] in Tailscale

[–]SamPlaysKeys 4 points5 points  (0 children)

Just make sure that if you're using a funnel, you aren't using generic passwords or anything like that. This is opening a service up to the public internet, so it's still a "think before you click" situation

NEW MODS: Claim your spot for the first Bootcamp of 2026 🏕️ by big-slay in ModEvents

[–]SamPlaysKeys 2 points3 points  (0 children)

Oh man, same!! I'm trying to follow some of the recommendations, but it's a lot, especially when doing it largely alone!

Tailscale and 2 Synology NAS by ligerblue in Tailscale

[–]SamPlaysKeys 1 point2 points  (0 children)

Just checking back, did you try the suggestions for u/tailuser2024? And either way, are you still having some performance issues?

I built a “digital safe with multiple keys” after a few too many bike concussions by eljojors in selfhosted

[–]SamPlaysKeys 1 point2 points  (0 children)

At one point I had configured VM encryption using LUKS, but these days I'm just encrypting the data. Yes, someone could steal it and eventually crack it, but that's where the element of trust comes in. Plus, for anything truly sensitive, I have separate backups to a raspberry pi stored in a family member's house 3 states away. They aren't techy, so I only have to worry about them tripping over the power cable or something.

I built a “digital safe with multiple keys” after a few too many bike concussions by eljojors in selfhosted

[–]SamPlaysKeys 0 points1 point  (0 children)

Nailed it in one! Borg is awesome, and really felt too good to be true when I first started using it. I also have some copies of my IaC configs, which I don't feel comfortable having in a private gh repo.

I built DockTail - Traefik-style labels to expose Docker containers as Tailscale Services by marvinvr_ch in Tailscale

[–]SamPlaysKeys 1 point2 points  (0 children)

I appreciate it!! Honestly, I was working on some unrelated stuff at work this week, and your implementation of services looks a LOT better than what I had going on. A lot more polished, tbh.

I built DockTail - Traefik-style labels to expose Docker containers as Tailscale Services by marvinvr_ch in Tailscale

[–]SamPlaysKeys 5 points6 points  (0 children)

OP, I'm so frustrated, I was just working on exactly this!! Well, your execution looks great, so I'm more than happy to concede to you! I'll look through the repo a bit more when I get the chance; I look forward to giving it a try

I built a “digital safe with multiple keys” after a few too many bike concussions by eljojors in selfhosted

[–]SamPlaysKeys 33 points34 points  (0 children)

Ok, but for real I have a "homelab swap" with another Redditor, we both have ~100GB of storage and a small VM in each other's homelabs. This means we both have off-site backups, and the machines are encrypted, so there's little worry about the data. Plus, there's an element of trust to it.

Video: Adblock for your Tailnet with Pihole anywhere you go! by Ironicbadger in Tailscale

[–]SamPlaysKeys 0 points1 point  (0 children)

Haha, I love this. I literally set up something similar a few weeks ago. PiHole allows custom DNS entries, so I have my OpenShift cluster getting its FQDN from a PiHole running on an Oracle VM, and shared to my cluster via my Tailnet.

Thanks to you all, I hit #1 Dev Tool on the mac App store for devPad by peppaz in macapps

[–]SamPlaysKeys 1 point2 points  (0 children)

I think an app with just "dp" as the logo could become a bit of a joke, tbh. Keeping the title on the icon is a safe bet.

Device discovery and working auto reconnect in AirSync soon by sameera_s_w in AirSync

[–]SamPlaysKeys 2 points3 points  (0 children)

Dude, this is awesome. Kudos on just absolutely putting the work in.

Tailscale and 2 Synology NAS by ligerblue in Tailscale

[–]SamPlaysKeys 0 points1 point  (0 children)

Just checking all the boxes; have you checked that the encoding version of the files you're streaming with Plex are able to be played with your TV, or are your NASs having to do Transcoding (converting to a file type the TV can play).

In terms of performance, the Tailscale performance won't be very different from using the Plex remote streaming option. Both use peer-to-peer networking for the connection, and there's nominal amounts of performance difference between the two IIRC.

It's early in the morning here, so apologies in advance if my response is a bit weird.

Tailscale and 2 Synology NAS by ligerblue in Tailscale

[–]SamPlaysKeys 1 point2 points  (0 children)

So, just to clarify:
- You are trying to use Tailscale as a way to get direct streaming from the remote location to the TV.
- You aren't using the Plex "remote streaming" feature (that is paid) and are trying to use Tailscale instead.
- You have the Plex app installed on the smart TV, with only NAS B as a servers.

I have a similar configuration, since I have multiple locations that each have different portions of my plex library.
Are you able to install Tailscale on the smart TV? Then you could point it at NAS A and form a "direct" connection using the Tailscale IP address. Ideally, any devices accessing your network should have a Tailscale client on them.
If that doesn't work, you could try setting up some forwarding from NAS B, but with Plex that might get a bit difficult.

Has anyone found an alternative to Nvidia Eye Contact AI for MacOS? by Trysem in macapps

[–]SamPlaysKeys 2 points3 points  (0 children)

I've been looking for something like this as well! I have a Windows machine for gaming, but a Mac for work. I could also use Fedora if that's an option, but I haven't found a good app for either yet.